Ask Question, Ask an Expert

+1-415-315-9853

info@mywordsolution.com

Ask Computer Engineering Expert

Sports Centre

You are needed to develop an advanced system for a Sports Centre, you are concerned only with representing data discussed below about bookings and members. (The complete system might consists other data and other aspects of the organisation, if you think other aspects are suitable to your design of this part include that information in the discussion section.)

Activities:

There are a range of activities available like treadmills, rowing machines, weights, static cycles and games rooms like squash courts, badminton courts, table tennis rooms.

Members:

We require to keep names, addresses and contact numbers and each member has a unique id allocated to them. We also require to record how long they have been a member ( extra benefits or discounts might be made available on the basis of length of membership). There are two types of members:

• Basic: who have access to 3 activities which they have signed up for. Basic membership only permits you to use the facilities at off peak times.

• Full: who could use any facility at any time. These members might have specified particular activities that they are interested in and which they might be offered special promotions in.

Bookings:

Facilities could be booked for hour slots from when the centre opens 8:00 AM till when it closes at 9:00 PM. Suppose that we are only concerned with bookings for the next week i.e. Monday to Saturday, shut on Sunday. Peak periods are currently 12:00 to 2:00 and 5:00 to 7:00.

Requirements:

The system must be able to produce reports such as:

• a listing of all empty badminton courts on Friday.

• when a basic member can book weights.

answer queries such as:

• Who are the full members with an interest in table tennis?

• Who has been a member longer than 3 years and will be in on Friday?

• Who has booked a particular squash court at 4:00 on Saturday?

and perform functions like:

• transfer a member from basic to full status.

For this coursework you may ignore non-essential attributes and other tables/structures that would be present for other uses of the database.

The project will cover:

• the analysis

• design and implementation in an Object/Relational system

• and issues for implementation in a different type of advanced system. e.g. Object or XML.

The implementation must include suitable use of the advanced features of PostgreSQL (a normal relational solution is not acceptable).

• A diagrammatic representation of the entities in the system and their relationships (E/R diagram or UML class diagram).

• Details of tables/structures etc. which you implemented including appropriate types, details of your test data (you must supplement any data given with additional material), and screen shots to demonstrate how your system answered the requirements. (This could be from psql (or other simple terminal monitor type interface) you are not needed to build any particular interface to the system.)

• Alternative definitions of entities for the Object or XML based solution and a discussion of the advantages and disadvantages of these and the solution you implemented. One topic to be addressed is whether your solution works if the last query had been "Who is playing on a particuar squash court at 4:00 on Saturday?".

• Any assumptions you have made.

Computer Engineering, Engineering

  • Category:- Computer Engineering
  • Reference No.:- M91730

Have any Question? 


Related Questions in Computer Engineering

1 why is it important to use specific and clearly defined

1. Why is it important to use specific and clearly defined job descriptions for hiring information security professionals? 2. What functions does the CISO perform, and what are the key qualifications and requirements for ...

1 consider the similarities and differences between basic

1. Consider the similarities and differences between basic research and applied research. What does each contribute to our knowledge about behavior? 2. Describe the characteristics of descriptive, correlational, and expe ...

Develop hardening checklist for windows 10one of the most

Develop Hardening Checklist for Windows 10 One of the most useful tools you will use in your role as an Information Security professional is a hardening checklist. Essentially, it is a document that serves as a guide to ...

Alternative matrixdesign alternatives have to be thoroughly

Alternative Matrix Design alternatives have to be thoroughly considered. There must be a process to fairly evaluate the pros and cons of each option. Let's look at how the alternative matrix can help facilitate the desig ...

In 300 words or more plesae answer the followinginformation

In 300 words or more plesae answer the following: Information technology professionals face many ethical obligations, conflicts, and dilemmas. Discuss ethical issues an IT professional might face. Consider the new trends ...

1 how is an sts multiplexer different from an adddrop

1. How is an STS multiplexer different from an add/drop multiplexer since both can add signals together? 2. What is the relationship between STS signals and OC signals? 3. What is the purpose of the pointer in the line o ...

1 what is radius what advantage does it have over tacacs2

1. What is RADIUS? What advantage does it have over TACACS? 2. What is a content filter? Where is it placed in the network to gain the best result for the organization? 3. What is a VPN? Why is it becoming more widely us ...

1 when your program executes a throw statement which

1. When your program executes a throw statement, which statement is executed next? 2. What happens if an exception does not have a matching catch clause? 3. What can your program do with the exception object that a catch ...

1 write a program that reads in babynamestxt and produces

1. Write a program that reads in babynames.txt and produces two files boynames.txt and girlnames.txt, separating the data for the boys and girls. 2. Write a program that reads a file in the same format as babynames.txt a ...

Secure encrypted communicationstransmitting personal and

Secure Encrypted Communications Transmitting personal and business data and information over secure communication channels is critical. In some cases it is required, especially when personally identifiable information is ...

  • 4,153,160 Questions Asked
  • 13,132 Experts
  • 2,558,936 Questions Answered

Ask Experts for help!!

Looking for Assignment Help?

Start excelling in your Courses, Get help with Assignment

Write us your full requirement for evaluation and you will receive response within 20 minutes turnaround time.

Ask Now Help with Problems, Get a Best Answer

WalMart Identification of theory and critical discussion

Drawing on the prescribed text and/or relevant academic literature, produce a paper which discusses the nature of group

Section onea in an atwood machine suppose two objects of

SECTION ONE (a) In an Atwood Machine, suppose two objects of unequal mass are hung vertically over a frictionless

Part 1you work in hr for a company that operates a factory

Part 1: You work in HR for a company that operates a factory manufacturing fiberglass. There are several hundred empl

Details on advanced accounting paperthis paper is intended

DETAILS ON ADVANCED ACCOUNTING PAPER This paper is intended for students to apply the theoretical knowledge around ac

Create a provider database and related reports and queries

Create a provider database and related reports and queries to capture contact information for potential PC component pro